Phreak87 / ESPeensy-and-Peensy-Payload-Generator-ESP8266-Teensy-3.5-View external linksLinks
Build your own Bad USB Stick for pentesting with wifi and dip switches
☆43Dec 3, 2016Updated 9 years ago
Alternatives and similar repositories for ESPeensy-and-Peensy-Payload-Generator-ESP8266-Teensy-3.5-
Users that are interested in ESPeensy-and-Peensy-Payload-Generator-ESP8266-Teensy-3.5- are comparing it to the libraries listed below
Sorting:
- Wifi enabled USB backdoor☆42Nov 13, 2016Updated 9 years ago
- ☆11Dec 3, 2014Updated 11 years ago
- An Open Source KoTH Platform☆12Jul 19, 2023Updated 2 years ago
- ProxmarkIII mods and designs made for the wild☆13Sep 23, 2016Updated 9 years ago
- WiFi Beacon & Client sniffing pipeline for analysing the movements of Human Traffickers.☆14Oct 9, 2018Updated 7 years ago
- My payloads for attacks utilizing a rubber ducky, teensy, and digistump☆26Dec 19, 2020Updated 5 years ago
- A PoC script for reading and writing HID iClass credentials using an iClass RW device over serial☆15May 12, 2014Updated 11 years ago
- ☆15May 2, 2015Updated 10 years ago
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- Simple code to execute payloads depending on the detected OS.☆33Jul 6, 2019Updated 6 years ago
- A remote 64bit application proc call helper for Wow64(win32 on win64) application.☆11Jan 26, 2022Updated 4 years ago
- RFID spoofing code from scanlime.org☆20Sep 12, 2012Updated 13 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- Tools to pull data from HID iClass readers☆17Nov 9, 2012Updated 13 years ago
- This script allows you to create a hidden admin account on your victim's PC.☆43Feb 8, 2025Updated last year
- ☆24Jan 19, 2020Updated 6 years ago
- WiFi Pineapple DIY☆79Feb 21, 2017Updated 8 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆22Oct 1, 2016Updated 9 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- ☆21Jan 1, 2025Updated last year
- ☆22Jun 1, 2024Updated last year
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Jan 11, 2015Updated 11 years ago
- This is pulled from http://www.openpcd.org/Talk:HID_iClass_demystified☆21Dec 17, 2012Updated 13 years ago
- Wisecracker is a high performance distributed cryptanalysis framework.☆49Dec 5, 2016Updated 9 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Screen eavesdrop in real time leveraging SDR and pure Julia implementation !☆28Nov 6, 2025Updated 3 months ago
- Smart card hacking tools based on Arduino.☆26Sep 28, 2016Updated 9 years ago
- Purpose-built Red Team network hardware implant made from common components.☆25Mar 18, 2023Updated 2 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- Reliable Teensy Penetration Testing Payload☆183Sep 17, 2012Updated 13 years ago
- Hacking environment installation scripts for OS X☆28Jan 16, 2022Updated 4 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆64Jun 5, 2018Updated 7 years ago
- HID attack payload generator for Arduinos☆166Jul 8, 2024Updated last year
- Files for GuardBunny, an RFID shield presented at Shmoocon 2016☆57Aug 7, 2018Updated 7 years ago
- This is BadUSB / Rubberducky device example based on ARDUINO MICRO SS BETTLE. Allows for doing nasty things over USB☆30Nov 1, 2021Updated 4 years ago
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- Bad USB collections with malicious firmware☆74Jan 10, 2015Updated 11 years ago
- EM4100 RFID Cloner Kit☆63May 7, 2023Updated 2 years ago
- Arduino PBOC Library using MFRC522☆11Jul 27, 2017Updated 8 years ago